Hidden Signatures in Images

advertisement
Digital Watermarking
Multimedia Security
What is the Watermark ?
• Paper Watermark
– the technique of impressing into
the paper a form, image, or text
• to make forgery more difficult
• to record the manufacturer’s
trademark
2
Digital Watermark
• A digital watermark
– a digital signal or pattern imposed on a digital document ( text,
graphics, multimedia presentations )
• visible watermark
– the more obvious means of discouraging unauthorized use by
reducing the commercial value of a document
• invisible watermark
– the watermark is imperceptible to the human eye
– when the ownership of data is in question, the watermark will then
be extracted to characterize the ownership
3
Visible Watermarking
• G. W. Braudaway, K. A. Magerlein and F. Mintzer, “Protecting publiclyavailable images with a visible watermark,” SPIE, vol. 2659, 1996, pp.
126-133.
4
Invisible Watermark
• Motivation
– The distribution of digital media is becoming faster, easier and
requiring less effort to make exact copies
• How to protect the intellectual property?
• Conventional approaches
– In analog world
• signature, steel seal, embossed portrait, copyright label...
– In digital world: cryptology
M
E
encryption key
D
M
decryption key
5
Cryptology vs. Watermarking
• Cryptology
Once the data is decrypted, subsequent retransmission
or dissemination is not encrypted
• Watermarking
– Copyright information is hidden into digital data itself
– Not restrict to access the data
– Its objective is to permanently and unalterably reside in
the data
6
Watermarking Requirements
• Imperceptible
• Undeletable
• Statistically undetectable
• Robustness
– resistant to lossy data compression
– resistant to signal manipulation and
processing operation
• Unambiguous
7
Watermarked Image
Transmission
Lossy
Compression
Geometric
Distortions
Signal
Processing
D/A - A/D
Conversion
Typical Distortions or Intentional Tampering
Transmission
Corrupted Watermarked Image
8
Watermark Embedding
• Making the watermark robustness is not trivial
– with complete knowledge
• any watermark can theoretically be removed
– with partial knowledge
• the removal may interfere with the viewing of the data
• the effort of removal is greater than the value of the data
• Challenges from data compression
– Whatever hole one may find to fill with watermark is likely to be
eliminated by data compression
9
Watermarking for Text
J.T. Brassil,”Electronic Marking and Identification Techniques
Discourage Document Copying,” IEEE JSAC, vol 13, no.8, Oct, 1995.
to
• Line-Shift Coding
• Word-Shift Coding
•
Feature Coding
10
Watermarking for Images & Videos
• Watermarking in
spatial domain
transform domain
• Watermarking in
raw data
compressed data
• Watermarking with
random number
visually recognizable pattern
• Detection/extraction
with
without
the original data
11
LSB Flipping Method
S. Walton, “Image Authentication for a Slippery New Age,” Dr. Dobb’s
Journal, pp. 18-26, April 1995.
0
1
2
3
4
Bit 1
0
Bit 0
Watermark 1
1
Bit 1
Bit 2
Watermark 2
2
Bit 3
Bit 0
5
Bit 2
3
Bit 3 4
5
0
1
2
3
4
5
55
73
123
123
205
120
121
130
123
71
71
70
72
147
199
67
68
68
72
73
123
117
123
70
70
69
112
67
140
158
159
195
123
123
133
142
178
120
123
122
150
71
70
70
0
1
2
3
4
5
• Generate the random walk sequence for each watermark (e.g.. 00112)
• Force the LSB to match the watermark bit

This works will not survive any modification
12
Spread Spectrum Method
I. J. Cox,”Secure Spread Spectrum Watermarking for Multimedia,” IEEE
Trans. IP, vol 6, no.12, pp. 1673-1687, Dec. 1997.
• Spread spectrum coding of a watermark
– frequency domain of the image
– watermark
communication channel
the signal transmitted through the channel
the watermark W = w1,...,wn
each wi is chosen according to zero-mean Gaussian Distribution
the image X is transform by full-frame DCT
n highest magnitude coefficients (except DC) are chosen: y1,...,yn
Embedding: y’i = yi + a wi
Extracting:
wi = (yi* - yi) / a
similarity = correlation (W,W *)
13
Spread Spectrum Method (cont.)
Original
Image
FFT/DCT
FFT/DCT
Watermark
Received
Image
Original
Image
Determine Perceptually
Significant Regions
-
Original
Watermark
Extracted
Watermark
Inverse FFT/DCT
Watermarked
Image
Similar
14
Spread Spectrum Method (cont.)
• Watermark detector
Watermark detector response to 1000 randomly generated watermarks
15
Perceptually Masking Method
M. D. Swanson,”Transparent Robust Image Watermarking,” Proc. ICIP, pp.
211-214, Sep. 1996.
Original
Image
F
DCT
+
F’
W
Perceptual
Analysis
m-sequence
x
IDCT
Watermarked
Image
Spatial
Masking
DCT
 Detection
H 0 : X = F* - F = N
H 1 : X = F* - F = W * + N
the hypothesis decision is obtained by
similarity = correlation (X,W)
16
Perceptually Masking Method (cont.)
• Frame from “pingpong”
Similarity value
• The watermark
17
Digimarc Watermarking
• A commercial watermarking software
– http://www.digimarc.com
Creator ID
100024
18
Watermarking for Audio
• Phase Coding
– Inserting the watermark by modifying the phase of each
frequency component
• Spread Spectrum Method
– The watermark code is spread over the available frequency band,
and then attenuated and added as additive random noise
• Perceptual Method
– The watermark is generated by filtering a PN-sequence with a
filter that approximates the frequency masking characteristics of
HAS
– Weighting the watermark in the time domain to account for
temporal masking
19
Watermarking for Audio (cont.)
L. Boney, “Digital Watermarks for Audio Signals, “ IEEE Proc.
Multimedia’96, pp. 473-480, 1996.
• Watermark generator
Audio
Signal
Hanning
Window
FFT
Frequency
Masking
Information
Quantization
Scale
Factor
PN
sequence
w+
original
signal
w
M(w)
×
×
+
Extract
Envelop
Filtered PN-sequence
20
Watermarking for Audio (cont.)
• Watermark detection
21
Watermarking for Polygonal Models
R. Ohbuchi, “Watermarking 3-D Polygonal Models,” ACM Multimedia 97,
pp. 261-272, 1997.
• 3D models watermarking
– vertex coordinates
– vertex topology (connectivity)
Embedded pattern
Simplified polygonal
22
Limitations of Watermarking
S. Craver, “Can Invisible Watermarks Resolve Rightful Ownerships?,” IBM
Research Report, July, 1996.
• Basic watermarking steps
Image I
I’
E
Watermark W
Test image J
Image I
D
W’
C
y/n ?
Watermark W
23
Limitations of Watermarking (cont.)
• Counterfeit
Watermarked image I’
Counterfeit image I*
Dinv
W*
I’
D
I
I’
C
y/n ?
C
y/n ?
Watermark W
D
I*
W
W*
Watermark W*
24
Digital watermark
Visible watermark
Invisible watermark
Random sequence
watermark
Visually recognizable
watermark
Watermark :
ID number (random number)
Visually recognizable pattern
Verification :
Quantitative measurement of
the detection
Extracted pattern &
Quantitative measurement
25
Download